General

  • Target

    c62556c0c10d5441a43119bdc9ea3e5a0b92d2546ad0ad0b9cba482da8430bf1

  • Size

    9.6MB

  • Sample

    240722-fwbccszhnp

  • MD5

    4a0b3c363eeb8dfc1e9154dbc6a03a7b

  • SHA1

    2e8077211e187d4add47910bacb888e66649bcec

  • SHA256

    c62556c0c10d5441a43119bdc9ea3e5a0b92d2546ad0ad0b9cba482da8430bf1

  • SHA512

    db8b6abb8f6907f8ab86cc3f240aa1bed980ad615f6bc60ac256ff14c516d84bd384d8fac410297dc7f6206fe4da61ef751ec13018122486374ddf0f6ecd05b3

  • SSDEEP

    196608:jdo9nDnuwjlN2gpqjZenSR/Y6inpMnb3rn0jAtIE8Xtz9:jinDuklkZiSR/QnGnb3r0jeIEKz

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

9ca5d0

C2

http://77.91.77.140

Attributes
  • install_dir

    674c1801fe

  • install_file

    Hkbsse.exe

  • strings_key

    89fcde63d3a4658c6be472c7647616bc

  • url_paths

    /g9bkfkWf/index.php

rc4.plain

Targets

    • Target

      c62556c0c10d5441a43119bdc9ea3e5a0b92d2546ad0ad0b9cba482da8430bf1

    • Size

      9.6MB

    • MD5

      4a0b3c363eeb8dfc1e9154dbc6a03a7b

    • SHA1

      2e8077211e187d4add47910bacb888e66649bcec

    • SHA256

      c62556c0c10d5441a43119bdc9ea3e5a0b92d2546ad0ad0b9cba482da8430bf1

    • SHA512

      db8b6abb8f6907f8ab86cc3f240aa1bed980ad615f6bc60ac256ff14c516d84bd384d8fac410297dc7f6206fe4da61ef751ec13018122486374ddf0f6ecd05b3

    • SSDEEP

      196608:jdo9nDnuwjlN2gpqjZenSR/Y6inpMnb3rn0jAtIE8Xtz9:jinDuklkZiSR/QnGnb3r0jeIEKz

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Poverty Stealer Payload

    • Poverty Stealer

      Poverty Stealer is a crypto and infostealer written in C++.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks